
Security Intelligence
Security for Charitable Foundations and Philanthropic Operations | CloseProtectionHire
HNWI philanthropists and foundation directors face distinct security risks from public grant announcements to overseas charitable operations. James Whitfield explains the baseline.
Written by James Whitfield — Senior Security Consultant
Philanthropic foundations run by HNWI principals occupy an unusual space in security planning. The principal’s charitable activities are often more public than their business activities. The combination of high visibility, overseas operational presence, and frequent public events creates a security profile that many foundations have not formally addressed.
James Whitfield, Senior Security Consultant, has advised foundation trustees and their principals on this specific intersection. The starting point, he notes, is recognising that charitable intent does not reduce the threat environment.
Grant announcements and visibility management
A large public grant announcement creates a defined moment of visibility for the principal. A GBP 10m commitment to an educational foundation, announced at a charity dinner with press coverage and social media amplification, identifies the principal as an HNWI with accessible capital in a way that private business activity does not.
In lower-risk environments, this visibility creates a manageable but real increase in social engineering, scam, and physical approach risk. In cities with elevated kidnap-for-ransom risk, it feeds targeting intelligence. OSAC annual reports for Nigeria, Kenya, Colombia, and the Philippines all document the use of public records, press coverage, and social media to identify kidnap targets from among high-net-worth individuals.
The mitigation is not silence: transparency obligations apply to registered charities under Charity Commission guidance CC15d, and major donors frequently have reputational reasons to be publicly associated with their giving. The mitigation is timing awareness and visibility management: reviewing whether a specific announcement creates disproportionate peak exposure, whether the principal’s identity can be associated with a foundation name rather than their personal name without undermining the charitable purpose, and whether the principal’s own public profile in the period following a major announcement warrants additional precautions.
Charity galas, awards events, and public fundraising dinners introduce a specific risk: publicly ticketed events with unknown guests. At a private dinner with fifty known guests, the security baseline is straightforward. At a charity ball with four hundred ticket purchasers, the guest list includes individuals who have not been vetted. At high-value events where an HNWI principal is identifiable as the lead donor and will be visible for several hours, advance guest list review, venue access control, and consideration of the principal’s exposure within the venue are appropriate.
Overseas operations: the staff security dimension
Foundations with programme operations in high-risk countries carry a duty of care to their staff that mirrors the obligations of any employer. The Health and Safety at Work Act 1974, the Management of Health and Safety at Work Regulations 1999, and the duty of care principles in ISO 31030:2021 apply to charity staff on overseas programme visits in the same way they apply to corporate staff.
The Charity Commission’s trustee guidance requires risk assessment for overseas operations as part of the trustee risk register. That assessment must include physical security risk in the relevant operating environment. A foundation operating in northern Nigeria, South Sudan, or eastern DRC without a documented security assessment is in breach of trustee duties, not just good practice.
Staff working in programme locations in P1 cities and conflict-affected environments need pre-travel security briefing, communications protocols, check-in schedules, and emergency response support. They are not protected by diplomatic status and may not have travel insurance that covers their specific operating environment. Foundation trustees should verify that the foundation’s travel insurance policy covers all programme-related travel, including in elevated-risk countries.
In-country partner organisations carry their own security risks for visiting foundation staff. A due diligence process for overseas partners should include assessment of the partner’s security arrangements: whether they have a security management plan, whether their staff receive security training, and whether their office and field locations have been assessed against the risks specific to their operating area.
See the related guidance on security for NGO and humanitarian workers for the detailed security framework that applies to programme staff in high-risk environments.
Donor and beneficiary data protection
Charitable foundations hold two categories of sensitive data: donor data and beneficiary data.
Donor data includes names, contact details, donation amounts, and potentially information about donors’ financial circumstances, tax arrangements, and personal motivations. This is personal data under UK GDPR and the Data Protection Act 2018. For foundation donors who are private individuals, it is personal data with significant sensitivity: a leaked donor list reveals both the individuals’ charitable associations and, potentially, the scale of their financial capacity.
Beneficiary data is often more sensitive still. Foundations working with children, vulnerable adults, refugees, or individuals affected by health conditions hold data that qualifies as special category data under UK GDPR Article 9: health data, religious beliefs, political opinions, racial or ethnic origin. Processing this data requires explicit consent, a legal basis under Article 9(2), and enhanced security measures proportionate to the sensitivity.
The ICO’s guidance on data protection for charities sets out the requirements. Key practical measures: access controls that limit beneficiary data to staff with a direct programme need, encryption for data at rest and in transit, a clear retention and deletion policy, and a data breach response procedure that meets the 72-hour notification requirement to the ICO.
A compromised beneficiary database is not just a regulatory event: it directly harms real people, potentially exposing their health status, their displacement circumstances, or their involvement in politically sensitive activities to audiences who could use that information against them.
The principal’s personal security exposure
Foundation activities create visibility that feeds into the principal’s overall threat assessment. A HNWI who makes major public donations, chairs a foundation board, attends high-profile charity galas, and visits overseas programme operations in high-risk countries has a larger public footprint than one whose philanthropy is entirely private.
This is not an argument against public philanthropy. It is an argument for integrating the foundation’s activities into the principal’s overall security programme. The private client security programme should account for the visibility created by charitable activities, the travel generated by overseas programme visits, and the events where the principal is publicly present in a context where the guest list is not fully controlled.
For foundations chaired or led by individuals who already have a close protection programme, the foundation’s activities should be briefed to the security team as a standard part of event and travel planning. Charity event schedules, overseas programme visits, and major public announcements should be included in the security team’s advance work cycle alongside business travel and private events.
See the guidance on security for family offices for the broader private client security framework within which foundation activities typically sit.
Trustee and adviser security
Foundation trustees, legal advisers, and accountants with access to foundation records and the principal’s charitable giving history hold sensitive information. The risk of that information being accessed or disclosed is an insider threat question, not uniquely a charity question, but the charitable context adds specific dimensions.
Large donations to politically associated causes, religious institutions, or overseas organisations may have political or reputational sensitivity beyond their charitable purpose. A leaked record of a principal’s charitable giving history could be used for reputational damage, political pressure, or targeted social engineering.
Trustee meeting minutes, grant records, and beneficiary files should be stored on encrypted platforms with role-based access controls. External advisers should access foundation records only through secure channels and only for the purpose for which access was granted.
Sources: Charity Commission CC29 Safeguarding Guidance 2024; Charity Commission CC15d Reporting Requirements 2024; ICO Data Protection Guidance for Charities 2024; UK GDPR and Data Protection Act 2018; Health and Safety at Work Act 1974; Management of Health and Safety at Work Regulations 1999; ISO 31030:2021 Travel Risk Management; OSAC Nigeria, Kenya, Colombia, Philippines 2024; FCDO Travel Advice April 2026.
Key takeaways
Grant announcements require a security review
Before any high-profile public announcement of a major donation, assess whether the announcement creates disproportionate visibility for the principal. Phased or aggregated reporting may reduce peak exposure without compromising transparency obligations.
Charity gala events carry unknown guest risk
Publicly ticketed charity galas introduce a guest list that includes unknown individuals. Ticket purchasers are not vetted in the same way as private event guests. At high-value events involving HNWI principals, advance guest list review and venue access control are appropriate.
Overseas operations require a country-level security assessment
Charity Commission trustee guidance requires risk assessment for overseas operations. That assessment must include physical security risk for staff and the principal when visiting.
Beneficiary data is among the most sensitive data a charity holds
Data on vulnerable adults and children held in connection with charitable programmes is special category data under UK GDPR. Its compromise causes direct harm to real people. Treat it with the same security rigour as the foundation's financial data.
The foundation's staff in-country face the same risks as any other professional in that environment
Foundation staff visiting programme operations in Nigeria, Kenya, Colombia, or the Philippines face the same physical risk environment as any corporate traveller. They do not benefit from diplomatic protection and may not have corporate travel insurance that covers high-risk locations.
Frequently Asked Questions
Request a Consultation
Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.
Your enquiry has been received. A security consultant will contact you within 24 hours to discuss your requirements.
